HomeSort by relevance Sort by last modified time
    Searched refs:EAP (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
265 # WPA-EAP = WPA using EAP authentication
266 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
270 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithm
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf.orig 113 # EAP fast re-authentication
114 # By default, fast re-authentication is enabled for all EAP methods that
131 # Dynamic EAP methods
132 # If EAP methods were built dynamically as shared object files, they need to be
133 # loaded here before being used in the network blocks. By default, EAP methods
307 # WPA-EAP = WPA using EAP authentication
308 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
312 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithm
    [all...]
nmake.mak 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to
86 $(OBJDIR)\eap.obj \
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.c 2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
28 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
35 /* EAP state machines are described in RFC 4137 */
87 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init()
90 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
93 * This function is used to fetch user information for EAP. The user will be
127 SM_STATE(EAP, DISABLED)
129 SM_ENTRY(EAP, DISABLED);
134 SM_STATE(EAP, INITIALIZE
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
29 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
36 /* EAP state machines are described in RFC 4137 */
88 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init()
91 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
94 * This function is used to fetch user information for EAP. The user will be
128 SM_STATE(EAP, DISABLED)
130 SM_ENTRY(EAP, DISABLED);
135 SM_STATE(EAP, INITIALIZE
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
37 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
94 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
103 * eap_allowed_method - Check whether EAP method is allowed
104 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
106 * @method: EAP type
107 * Returns: 1 = allowed EAP method, 0 = not allowed
133 SM_STATE(EAP, INITIALIZE)
135 SM_ENTRY(EAP, INITIALIZE)
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
  /external/wpa_supplicant/
eap.c 2 * EAP peer state machines (RFC 4137)
36 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
92 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
105 SM_STATE(EAP, INITIALIZE)
107 SM_ENTRY(EAP, INITIALIZE);
110 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
128 * the first EAP-Packet */
148 SM_STATE(EAP, DISABLED
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
37 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
95 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
104 * eap_allowed_method - Check whether EAP method is allowed
105 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
107 * @method: EAP type
108 * Returns: 1 = allowed EAP method, 0 = not allowed
134 SM_STATE(EAP, INITIALIZE)
136 SM_ENTRY(EAP, INITIALIZE)
    [all...]
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert,
53 * The following is a sample configuration file for an access point using EAP-PEAP with MSCHAP2.
57 * <security>EAP</security>
58 * <eap>PEAP</eap>
75 static final int EAP = 3;
86 } else if (security.equalsIgnoreCase("EAP")) {
87 return EAP;
113 boolean eap = false;
139 if (tagName.equalsIgnoreCase("eap")) {
    [all...]
  /external/wpa_supplicant_8/hostapd/
Android.mk 277 # Example EAP-SIM/AKA interface for GSM/UMTS authentication. This can be
425 # Basic EAP functionality is needed for EAPOL

Completed in 217 milliseconds